<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PAT limitation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096916#M393758</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So why dont you perform a destination Port-forwarding but in this case saying any packet being sourced from port 500 or 4500 look like 12.x.y.z??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also what do you mean by a reply? are those packets going to start on the outside world or this devices will start the Isakmp connections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Dec 2012 23:43:16 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-12-24T23:43:16Z</dc:date>
    <item>
      <title>PAT limitation</title>
      <link>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096915#M393756</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm pretty sure the answer to this is that only one-to-one NAT will do, but in case I've missed a trick, please let me know. I have several internal devices that need to use PAT (due to limited global ip addresses) as shown below where incoming tcp 2201 is translated to ssh and directed to the first device, tcp 2201 gets translated and directed the the 2nd device, and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network device1&lt;/P&gt;&lt;P&gt; host 10.1.10.35&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 12.x.y.z service tcp 22 2201&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network device2&lt;/P&gt;&lt;P&gt; host 10.2.10.35&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 12.x.y.z service tcp 22 2202&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network device3&lt;/P&gt;&lt;P&gt; host 10.3.10.35&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 12.x.y.z service tcp 22 2203 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vendor of these devices would like to see the return traffic, which is not ssh but udp 500 and udp 4500, egress the same address above 12.x.y.z&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to do that without one-to-one NAT?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096915#M393756</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2019-03-12T00:40:49Z</dc:date>
    </item>
    <item>
      <title>PAT limitation</title>
      <link>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096916#M393758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So why dont you perform a destination Port-forwarding but in this case saying any packet being sourced from port 500 or 4500 look like 12.x.y.z??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also what do you mean by a reply? are those packets going to start on the outside world or this devices will start the Isakmp connections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Dec 2012 23:43:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096916#M393758</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-24T23:43:16Z</dc:date>
    </item>
    <item>
      <title>PAT limitation</title>
      <link>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096917#M393760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My example description is wrong, but maybe you picked up on that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the outside inbound...&lt;/P&gt;&lt;P&gt;tcp 2201 translates to ssh and is sent to device1&lt;/P&gt;&lt;P&gt;tcp 2202 ssh to device2&lt;/P&gt;&lt;P&gt;tcp 2203 ssh to device3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These devices accept ssh connections and then initiate a tunnel outbound with udp 500 and udp 4500. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Given the PAT config already in place, I'm not sure how to code your suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you give me an example?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Dec 2012 01:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096917#M393760</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2012-12-25T01:40:50Z</dc:date>
    </item>
    <item>
      <title>PAT limitation</title>
      <link>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096918#M393762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well as the oubound connection will be in place because of the inbound connection as you said there is no way to make that happen &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry to tell you that my friend &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Merry Christmas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Dec 2012 02:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-limitation/m-p/2096918#M393762</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-25T02:09:40Z</dc:date>
    </item>
  </channel>
</rss>

